<p>We are seeking a Business Systems Analyst to serve as a key liaison between business stakeholders and technical teams. This role focuses on analyzing business processes, translating requirements into system solutions, and ensuring technology supports operational and strategic objectives.</p><p>Responsibilities</p><ul><li>Partner with business stakeholders to gather, analyze, and document functional and technical requirements</li><li>Translate business needs into clear system requirements, use cases, and process flows</li><li>Analyze existing systems and workflows to identify gaps, inefficiencies, and improvement opportunities</li><li>Collaborate with developers, architects, and vendors to design and implement system enhancements</li><li>Support system implementations, upgrades, and integrations from requirements through deployment</li><li>Create and maintain documentation including requirements documents, process maps, and test cases</li><li>Participate in user acceptance testing (UAT), validate solutions, and ensure requirements are met</li><li>Support change management, including training materials, rollout plans, and user communication</li><li>Serve as a subject‑matter expert for assigned business applications and processes</li></ul><p><br></p>
<p>We are seeking a skilled <strong>Security Analyst</strong> with <strong>Security Operations Center (SOC)</strong> experience to support and strengthen our client’s cybersecurity operations. This role is ideal for a hands-on professional with experience monitoring, detecting, investigating and responding to security threats across enterprise environments.</p><p>The Security Analyst will play a key role in protecting systems and data by leveraging <strong>Microsoft Sentinel</strong>, <strong>SIEM platforms</strong>, <strong>vulnerability management tools</strong>, and <strong>network monitoring solutions</strong>.</p><p><strong>Key Responsibilities:</strong></p><ul><li>Monitor security events and alerts through <strong>Microsoft Sentinel</strong> and other <strong>SIEM tools</strong></li><li>Investigate and respond to security incidents, suspicious activity and potential threats</li><li>Perform triage, analysis and escalation of security events within a <strong>SOC environment</strong></li><li>Conduct <strong>vulnerability assessments</strong> and support remediation efforts across systems, applications and networks</li><li>Analyze logs, traffic and endpoint data to identify indicators of compromise</li><li>Support <strong>network monitoring</strong> efforts to detect unauthorized access, anomalies and malicious behavior</li><li>Collaborate with IT and infrastructure teams to strengthen security controls and incident response processes</li><li>Assist with threat detection use cases, alert tuning and continuous improvement of SOC procedures</li><li>Document incidents, findings, response actions and recommendations</li></ul><p><br></p>